CVE-2006-0707

NameCVE-2006-0707
DescriptionPyBlosxom before 1.3.2, when running on certain webservers, allows remote attackers to read arbitrary files via an HTTP request with multiple leading / (slash) characters, which is accessed using the PATH_INFO variable.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
pyblosxom (PTS)buster1.5.3-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
pyblosxomsourcesarge(not affected)
pyblosxomsource(unstable)1.3.2-1high

Notes

[sarge] - pyblosxom <not-affected> (Vulnerable path handling code not present)

Search for package or bug name: Reporting problems